Corporate Partners

Data Protection — News

IPv6: Dual-stack strategy starts at the perimeter

We are in an awkward point in the history of the Internet. <a href="">IPv4 address depletion</a> has occurred yet we expect to use IPv4 for the next 15 to 20 years. Organizations see two paths before them. One alternative is to use continue to use IPv4 and expect to use multiple layers of network address translation (NAT) for many years to come. The other alternative is to start to use IPv6, however, the majority of enterprise organizations and content providers have not embraced the protocol.

Scott Hogg | 14 Feb | Read more

The week in security: Would you notice if you were hacked?

Confident you would notice if your systems were being hacked? You’re in the minority: A new survey has found just 16 per cent of organisations hit by a breach last year noticed it before someone else told them about it. That’s hardly surprising given another study that found many of the worst malware offenders are using methods that antivirus software just can’t spot or deal with.

David Braue | 13 Feb | Read more

Microsoft Ruining Valentine's Day with Nine Security Bulletins

Next Tuesday is a big deal. Yes, <a href="">it is Valentine’s Day</a>, but that’s not what I’m talking about. It is also the second Tuesday in the month of February which makes it Patch Tuesday. Microsoft revealed today that there are <a href="">nine new security bulletins</a> slated for next Tuesday -- Happy Valentine’s Day?

Tony Bradley | 10 Feb | Read more

Hackers Ask 'Will You Be My Valentine?'

There are only five days to Valentine's Day. Those of you who are shocked by that revelation are prime targets for Valentine's Day related spam and phishing attacks as hackers hope to catch you with your guard down for this day of romance.

Tony Bradley | 10 Feb | Read more

Google Wallet Security Concerns Raised

Google's new <a href="">NFC system</a> that purports to turn your phone into a credit card can be compromised using a brute-force attack -- and that raises questions about its security.

Sarah Jacobsson Purewal | 10 Feb | Read more

Security experts ask House for light a regulatory touch

Cybersecurity experts on Wednesday warned members of a House subcommittee against racing to legislation that would establish an overly burdensome regulatory framework for safeguarding digital systems against attacks, instead urging a more limited approach that would clear away legal impediments such as the prohibitions against sharing critical threat information.

Kenneth Corbin | 10 Feb | Read more

Know Your Internet Bad Guys

Anyone who makes a habit of wandering around in cyberspace should print <a href="">this TrendLabs infographic</a>, posted Wednesday, and keep it close at hand. This colorful web poster contains info on Internet bad guys, and helps people avoid getting scammed, hacked, or hurt by malware.

John P. Mello Jr. | 09 Feb | Read more

Researchers crack satellite encryption

Researchers at a university in Bochum, Germany claim to have cracked <a href="">encryption algorithms</a> of the European Telecommunications Standards Institute (ETSI) that are used to secure certain civilian satellite phone communications.

Ellen Messmer | 09 Feb | Read more

DDoS attacks motivated by politics not criminality, Arbor Networks finds

Large Internet organisations believe ideological and political motivations have become the single commonest motivation behind the <a href=";utm_medium=twitter&amp;utm_campaign=Feed%3A+asert+%28DDoS+and+Security+Reports+|+Arbor+Networks+Security+Blog%29">DDoS attacks hitting their networks</a>, a survey of major Internet firms by has found.

John E Dunn | 09 Feb | Read more

Market Place